Compare cert salaries and plan your next career move
m3zilla wrote: » Without really getting into it, can you tell whether or not the users downstream will experience an outage when STP is converging?
m3zilla wrote: » I don't think it's unpredictable, it's just harder to predict what's going to happen. If you have a L2 topology, a few switches deep, and a switch fail/link flap? Without really getting into it, can you tell whether or not the users downstream will experience an outage when STP is converging? Like I said, if you know your L2 like the back of your hand, you'll be able to tell what's going to happen, but that doesn't mean it's not harder. I know what's 20+20 is, and I know what 20x20 is, but that doesn't mean I don't think addition is easier!
it_consultant wrote: » I used to work with couple of network engineers that were CCIE level and their philosophy was, essentially, why climb OSI for no reason. There is a whole lot of networking science surrounding delivering layer 2 links where we used to route because in most instances, it is better and easier to be on net.
it_consultant wrote: » No, you don't need a routed access layer in order to have reliable links that, if they fail, users won't be able to detect. We do this regularly with link aggregate port groups, what I call a LAG. In fact, the failover will be more seemless with a LAG than an equal cost route link. I have run a continuous ping over a LAG while we failed out ports in the LAG and nary a packet dropped. With VRRP there will be an interruption, all be it a small one.Link aggregation - Wikipedia, the free encyclopedia It isn't necessarily a bad thing to have routing, but to have a separate network for each access switch is totally unnecessary. You could have an access layer which is routed to the core; you would use VLAN for that. That way you have the flexibility of adding switches without needing another network plus, if your requirements change throughout the life of the network, your addressing isn't married to the switch's physical location. You can get really elaborate with LAGs. Traditionally switch A and switch B would be connected by one link. Lets say I deploy a traditional LAG. I plug another link between A and B and I get a bond. What happens if switch A or B fails. Those links don't amount to a hill of beans. So, I take switch A1 and A2, then B1 and B2, plug A1 and A2 together in a stacking configuration (40GB stacking cables) and do the same for B1 and B2. Then I take A1 and plug into B2 and A2 into B1. Since I have a stack those ports bond over a LAG, even though they are in different switches. This is the old picture Cisco uses to demonstrate spanning tree protocol, the one where we have to tell which ports will forward and which ones will block to prevent a loop. Except, in a LAG a loop will not occur (remember to set up the LAG BEFORE you plug the switches together). In a LAG, all ports will be forwarding. Not only do you get good throughput using LAGs, you can also isolate a switch failure to the individual switch at the access, distribution, and core layers.
networker050184 wrote: » It's possible though not on all devices. Look into multi chassis LAG.
it_consultant wrote: » You will make it fine, you just need some diversity and to and get some experience under your belt. Using GNS3 is pretty limiting. I looked it up and their simulated switches do not support even quasi advanced features. It does not support etherchannel, so far as I can tell. In fact, GNS3 is not really a switch simulator at all. It only supports routers with a switch WIC which kind of gives the appearance of a switch.
Eildor wrote: » If by diversity you mean learning other areas of IT, then I'm going to be in trouble. I've concentrated purely on networking, I don't know anything about setting up or managing a server. And even the networking I have been learning over 2 years is Cisco CCNA and CCNP stuff... so I wouldn't know how to configure a firewall, or monitor network traffic, or configure a Juniper device. The networking side of things is what I'm interested in; I do want to learn security too but I figured routing and switching would be more important as I can't see someone hiring a newbie for a security role. I think GNS3 does support L2 EtherChannel, just not L3 EtherChannel.
phoeneous wrote: » You shouldn't limit yourself like that. Bad idea in my opinion.
networker050184 wrote: » Why is that? I've never bothered learning anything besides networking because I know its what I want to do. I don't see a problem with having a goal and going for it without straying.
networker050184 wrote: » Of course a high level understanding of how devices communicate is needed, but knowing what you want to do and studying it is not a bad thing. Everyone doesn't have to spread their self so thin. Its one of the hugest mistakes I think people on TE make when trying to start out. You see the people that try to get their CCNA, their MSCE, their CEH and everything under the sun and still stuck on the help desk. Then you have the guy that has the laser focus to get himself somewhere. Studying servers and individual applications in depth is completely unnecessary to having a successful career in networking.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.